PRIVACY PROTECTED INTERNET NETWORKS, SUBNETWORKS AND SUB-SUBNETWORKS
First Claim
1. A software program configured to enable a creation of a protected subnetwork that can be accessed anonymously by a subnetwork protected device which has a anonymous address code associated to the subnetwork protected device, wherein said protected subnetwork is connected to a pre-existing network, the software enables the subnetwork protected device to be verified by a protected network reader;
- upon verification of authenticity the software allows access to the subnetwork and the anonymous address code is tracked and stored for interactions with a digital element within the protected subnetwork, wherein said digital elements is any digital code that conveys meaning and is defined as relating to meaning in language and logic.
0 Assignments
0 Petitions
Accused Products
Abstract
A computerized methods and systems to create, control and manage restricted scope and closed internet interactive networks, subnetworks and sub-subnetworks. The invention permits the protected network, subnetworks and sub-subnetworks to be connected to an open or previously established network, yet still remaining protected, secure and anonymous. Entrance into the protected interactive networks, subnetworks and sub-subnetworks by the user is achieved through a protected network device, anonymous address code, anonymous access code and/or anonymous login information. As the user interacts with the digital elements within the protected interactive networks, subnetworks and sub-subnetworks, a database of said interactions is created and used by the protected network provider in various ways, such as for user behavior information. No personal identifiable information is stored within interactive networks, subnetworks and/or sub-subnetworks and communication on said networks is unique, which inhibits and deters the targeting of the networks by cyber-criminals.
21 Citations
19 Claims
-
1. A software program configured to enable a creation of a protected subnetwork that can be accessed anonymously by a subnetwork protected device which has a anonymous address code associated to the subnetwork protected device, wherein said protected subnetwork is connected to a pre-existing network, the software enables the subnetwork protected device to be verified by a protected network reader;
- upon verification of authenticity the software allows access to the subnetwork and the anonymous address code is tracked and stored for interactions with a digital element within the protected subnetwork, wherein said digital elements is any digital code that conveys meaning and is defined as relating to meaning in language and logic.
- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A system, comprising:
a server computer having a software program within to enable a connectivity between a pre-existing internet network, a protected subnetwork and a protected sub-subnetwork, the software program including functionality that;
permits a possessor of a subnetwork protected device to enter the protected subnetwork anonymously and interact with digital elements;
thereafter providing the possessor of a subnetwork protected device with a multiple sub-subnetwork protected device for distributions to other new possessors in order to access the protected sub-subnetwork and interact with digital elements.- View Dependent Claims (12, 13, 14, 15, 16, 17)
-
18. A method to communicate on a protected internet network comprising:
-
a. The steps of communicating on a protected internet network between a user and a protected internet network provider; b. identifying the occurrence of a interaction between a user and a digital element; c. accessing at least one digital element from a pre-existing library of said digital elements; d. inserting the at least one said digital element interacted with into a pre-existing digital address code and a new digital address code; e. recording the pre-existing and new digital address code; f. recording the origin of the pre-existing digital address code; g. recording the time, date and communication of the insertion of the new digital element into the new digital address code; h. de-activating the pre-existing digital address code from active usage for communication; i. activating the pre-existing digital address code as an alert code in which any usage of the pre-existing digital address code alerts a system operator of a possible unauthorized intrusion; j. utilizing a pre-existing and a new digital element to initiate and control future communication; k. testing for intrusions attempts by utilizing the pre-existing digital address code activated as a alert code in sham communications; and l. testing for commercial and social value in regards to relevance of the at least one new digital element in the context of a other digital element within a protected network that have been associated with a communication. - View Dependent Claims (19)
-
Specification